首页 > 最新文献

International Conference on Information, Communications and Signal Processing最新文献

英文 中文
Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN 基于双通道CNN的同音易混淆域名检测
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_32
Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li
{"title":"Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN","authors":"Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li","doi":"10.1007/978-3-030-41579-2_32","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_32","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121657891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities 撕下你的伪装:网络钓鱼网站检测使用视觉和网络身份
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_44
Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo
{"title":"Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities","authors":"Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo","doi":"10.1007/978-3-030-41579-2_44","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_44","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126882474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks SecFlush:一种硬件/软件协同设计,用于实时检测和防御基于flush的缓存攻击
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_15
Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu
{"title":"SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks","authors":"Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu","doi":"10.1007/978-3-030-41579-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_15","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126912443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks 神经元选择:深度神经网络中对抗实例的防御
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_36
Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu
{"title":"Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks","authors":"Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu","doi":"10.1007/978-3-030-41579-2_36","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_36","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121950795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes) 高非线性布尔函数和向量布尔函数(s - box)的平行最陡爬坡
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_24
Athmane Seghier, Jianxin Li
{"title":"Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)","authors":"Athmane Seghier, Jianxin Li","doi":"10.1007/978-3-030-41579-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_24","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays 基于绑定保护继电器的隐藏服务综合安全性分析
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_30
Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun
{"title":"Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays","authors":"Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun","doi":"10.1007/978-3-030-41579-2_30","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_30","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption 基于LWE假设的电路密文策略属性加密
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_22
Geng Wang, Z. Liu, Dawu Gu
{"title":"Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption","authors":"Geng Wang, Z. Liu, Dawu Gu","doi":"10.1007/978-3-030-41579-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_22","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloning Vulnerability Detection in Driver Layer of IoT Devices 物联网设备驱动层克隆漏洞检测
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_6
Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang
{"title":"Cloning Vulnerability Detection in Driver Layer of IoT Devices","authors":"Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang","doi":"10.1007/978-3-030-41579-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_6","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context-Aware IPv6 Address Hopping 上下文感知的IPv6地址跳变
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_31
Matthias Marx, Monina Schwarz, M. Blochberger, Frederik Wille, H. Federrath
{"title":"Context-Aware IPv6 Address Hopping","authors":"Matthias Marx, Monina Schwarz, M. Blochberger, Frederik Wille, H. Federrath","doi":"10.1007/978-3-030-41579-2_31","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_31","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning WSLD:基于模糊匹配和深度学习的未知Webshell检测
Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_42
Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu
{"title":"WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning","authors":"Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu","doi":"10.1007/978-3-030-41579-2_42","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_42","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Conference on Information, Communications and Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1